2013
DOI: 10.1016/j.cose.2013.03.010
|View full text |Cite
|
Sign up to set email alerts
|

A framework for risk assessment in access control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…In addition, Khambhammettu et al [21] have suggested three different approaches to estimate security risks of access control operations using the risk assessment. These approaches use the subject trustworthiness, the object sensitivity, and the difference between them to estimate the risk value.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, Khambhammettu et al [21] have suggested three different approaches to estimate security risks of access control operations using the risk assessment. These approaches use the subject trustworthiness, the object sensitivity, and the difference between them to estimate the risk value.…”
Section: Related Workmentioning
confidence: 99%
“…It is responsible for taking the input features and quantify the risk value associated with the access request. Determining the security risk associated with each access request is a complex task, which requires the consideration of a variety of factors [21]. However, the ultimate goal is to develop an efficient risk estimation process.…”
Section: Access Control Requirements In the Iotmentioning
confidence: 99%
“…Khambhammettu et al [21] have proposed a framework based on estimating object sensitivity, subject trustworthiness, and the difference between the object sensitivity and the subject trustworthiness using a risk assessment. However, this framework does not provide how to estimate the risk value for each situation of the environment.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, risk management principals to security have been utilized in [38] to develop risk assessment framework. The developed formulae to quantify risk based on the equation by NIST, which defines Risk as the likelihood multiplied by the Impact, is devised in three different ways.…”
Section: Risk-aware Access Control Modelsmentioning
confidence: 99%